Prisma CSI is launching a new training program with its “Prisma Hacker Camp”, which will last a week of experience over many years and is equipped with real-life scenarios.

Contrary to traditional theoretical training, thanks to the training laboratory prepared by the leakage testing team, students will have the opportunity to practice the theoretical knowledge they learn with plenty of practice. In addition to the training that will take place, the participants will be expecting research and assignments. After a full week of full-time attendance, the efficiency will be high.

This training provides important content for people who want to work on cyber security, make a career and improve themselves.

For information about tuition fees, or if you have any questions , you can contact us at [email protected] .

Training Calendar
1. DayCyber Security Essentials and Basic Linux Training
2. DayLinux System Administration and Security
3. DayNetwork Security – 1
4. DayNetwork Security – 2
5. DayWeb Application Security – 1
6. DayWeb Application Security – 2
7. DayCTF
  • What is GNU / Linux?
  • Media Setup
  • Meeting with the Terminal
  • Editors
  • Most Basic Commands
  • File Structure
  • User Management
  • Group Management
  • Authority Management
  • Package Systems
  • Service Management
  • Application Management
  • Scheduled Tasks
  • Network Configuration
  • Logging Mechanisms
  • Basic Firewall Settings
  • Basic Security Configurations
  • Intelligence Definitions
  • Analysis Steps
  • Open Source Intelligence
  • Open Source Data Collection Techniques
  • Open Source Data Collection Tools
  • Penetration Test Principles
  • Information Collection Methods
  • Security Vulnerabilities and Discovery Methods
  • Introducing Favorite Tools
  • Introducing Metasploit
  • Exploitation Phase
  • Post Exploitation Phase
  • Security Systems and Bypass Methods
  • Exercises
  • Reporting
  • Web Technologies
  • Web Application Security Basics
  • Working Structure of HTTP Protocol
  • Passive Data Collection Methods
  • Active Data Collection Methods
  • Web Application Vulnerabilities
  • OWASP TOP 10
    • Injection(SQL, NoSQL, OS, LDAP etc.)
    • Broken Authentication
    • Sensitive Data Exposure
    • XML External Entities (XXE)
    • Broken Access Control
    • Security Misconfiguration
    • Cross-Site Scripting (XSS)
    • Insecure Deserialization
    • Using Components with Known Vulnerabilities
    • Insufficient Logging&Monitoring
  • Burp Suite
  • Web vulnerability Scanning Tools
  • WAF / IPS / IDS Bypass Techniques
  • Exercises
  • Reporting

Etkinlik Takvimi